Sunteți pe pagina 1din 8

2/25/20

Introduction to Wireless Networks

PGCSE202: Advanced Com puter Network & Security

Wireless?
• A wireless LAN or WLAN is a wireless local area
network that uses radio waves as its carrier.

• The last link with the users is wireless, to give a


network connection to all users in a building or
campus.

• The backbone network usually uses cables

Common Topologies
The wireless LAN connects to a wired LAN

• There is a need of an access point that bridges wireless LAN


traffic into the wired LAN.
• The access point (AP) can also act as a repeater for wireless
nodes, effectively doubling the maximum possible distance
between nodes.

1
2/25/20

Common Topologies
Complete Wireless Networks

• The physical size of the network is determined by the maximum


reliable propagation range of the radio signals.
• Referred to as ad hoc networks
• Are self-organizing networks without any centralized control
• Suited for temporary situations such as meetings and
conferences.

How do wireless LANs work?


Wireless LANs operate in almost the same way as wired LANs,
using the same networking protocols and supporting the most
of the same applications.

How are WLANs Different?


• They use specialized physical and data link protocols

• They integrate into existing networks through access points


which provide a bridging function

• They let you stay connected as you roam from one coverage
area to another

• They have unique security considerations


• They have specific interoperability requirements
• They require different hardware
• They offer performance that differs from wired LANs.

2
2/25/20

Physical and Data Link Layers


Physical Layer:
• The wireless NIC takes frames of data from the link layer,
scrambles the data in a predetermined way, then uses the
modified data stream to modulate a radio carrier signal.

Data Link Layer:


• Uses Carriers-Sense-Multiple-Access with Collision Avoidance
(CSMA/CA).

Integration With Existing Networks

• Wireless Access Points (APs) - a small device that


bridges wireless traffic to your network.

• Most access points bridge wireless LANs into Ethernet


networks,
• but Token-Ring options are available as well.

Integration With Existing Networks

IPX/SPX stands for Internetwork


Network Driver Interface
Packet Exchange/Sequenced
Specification, a Windows device
Packet Exchange
driver interface that enables a single
networking protocols used initially on
network interface card (NIC) to
networks using the Novell NetWare
support multiple network protocols.
operating systems

3
2/25/20

Roaming
• Users maintain a continuous connection as they roam
from one physical area to another
• Mobile nodes automatically register with the new
access point.
• Methods: DHCP, Mobile IP
• IEEE 802.11 standard does not
address roaming, you may need
to purchase equipment from one
vendor if your users need to roam
from one access point to another.

Security
• In theory, spread spectrum radio signals are
inherently difficult to decipher without knowing
the exact hopping sequences or direct
sequence codes used
• The IEEE 802.11 standard specifies optional
security called "Wired Equivalent Privacy"
whose goal is that a wireless LAN offer privacy
equivalent to that offered by a wired LAN. The
standard also specifies optional authentication
measures.

Interoperability
• Before the IEEE 802.11 interoperability was based on
cooperation between vendors.
• IEEE 802.11 only standardizes the physical and
medium access control layers.
• Vendors must still work with each other to ensure
their IEEE 802.11 implementations interoperate
• Wireless Ethernet Compatibility Alliance (WECA)
introduces the Wi-Fi Certification to ensure cross-
vendor interoperability of 802.11b solutions

4
2/25/20

Hardware
• PC Card, either with integral antenna or with
external antenna/RF module.
• ISA Card with external antenna connected by
cable.
• Handheld terminals
• Access points

Hardware

CISCO Aironet 350 series Wireless Handheld Terminal

Semi Parabolic Antenna BreezeCOM AP

Authentication
Means:
• Based on cryptography
• Non-cryptographic
• Both are identity-based verification mechanisms
(devices request access based on the SSID –
Service Set Identifier of the wireless network).

5
2/25/20

Authentication
• Authentication techniques

Privacy
• Cryptographic techniques
• WEP Uses RC4 symmetric key, stream cipher
algorithm to generate a pseudo random data
sequence. The stream is XORed with the data
to be transmitted
• Key sizes: 40bits to 128bits
• Unfortunately, recent attacks have shown that
the WEP approach for privacy is vulnerable to
certain attack regardless of key size

Data Integrity
• Data integrity is ensured by a simple encrypted
version of CRC (Cyclic Redundant Check)
• Also vulnerable to some attacks

6
2/25/20

Security Problems
• Security features in Wireless products are frequently
not enabled.
• Use of static WEP keys (keys are in use for a very long
time). WEP does not provide key management.
• Cryptographic keys are short.
• No user authentication occurs – only devices are
authenticated. A stolen device can access the
network.
• Identity based systems are vulnerable.
• Packet integrity is poor.

Other WLAN Security Mechanisms


• 3Com Dynamic Security Link
• CISCO LEAP - Lightweight Extensible Authentication
Protocol
• IEEE 802.1x – Port-Based Network Access Control
• RADIUS Authentication Support
• EAP-MD5
• EAP-TLS
• EAP-TTLS
• PEAP - Protected EAP
• TKIP - Temporal Key Integrity Protocol
• IEEE 802.11i

Data rates
• Data rates affect range
• 802.11b 1 to 11 Mbps in 4 increments
• 802.11a 6 to 54 Mbps in 7 increments
• The minimum data rate must be determined at design
time
• Selecting only the highest data rate will require a
greater number of APs to cover a specific area
• Compromise between data rates and overall system
cost

7
2/25/20

Access Point Placement and Power


• Typically – mounted at ceiling height.
• Between 15 and 25 feet (4.5m to 8m)
• The greater the height, the greater the
difficulty to get power to the unit. Solution:
consider devices that can be powered using
CAT5 Ethernet cable (CISCO Aironet 1200
Series).
• Access points have internal or external
antennas

Antenna Selection and Placement


• Permanently attached.
• Remote antennas connected using an antenna cable.
• Coax cable used for RF has a high signal loss, should
not be mounted more than a 1 or 2 meters away from
the device.
• Placement: consider building construction, ceiling
height, obstacles, and aesthetics. Different materials
(cement, steel) have different radio propagation
characteristics.

Connecting to the Wired LAN


• Consider user mobility
• If users move between subnets, there are
challenges to consider.
• OSes like Windows XP and 2000, Linux support
DHCP to obtain the new IP address for the
subnet. Certain applications such as VPN will
fail.
• Solution: access points in a roaming area are
on the same segment.

S-ar putea să vă placă și